Search results for: data Integrity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24746

Search results for: data Integrity

24596 Discursive (Re/De)Construction of Objectivity-Subjectivity: Critiquing Rape/Flesh Trade-Documentaries

Authors: Muhammed Shahriar Haque

Abstract:

As an offshoot of journalistic discourse, the documentary should be objective in nature without harbouring any preconceived notion to foster ulterior motifs. When it comes to a social issue like rape in South Asian countries, as media in recent times is inundated with this violent act in India, Pakistan, Myanmar, Bangladesh, how does one document it in terms of objectivity and subjectivity? The objective of this study is twofold: to document the history of documentaries, and to critically analyze South Asian rape/flesh trade-documentaries. The overall goal is to trace the (re/de)construction of objectivity-subjectivity in documentaries. This paper adopts a qualitative approach to documentarist discourse through the lens of critical discourse analysis (CDA). Data was gathered for 10 documentaries on the theme of rape and/or flesh trade from eight South Asian countries, predominantly the South Asian Association of Regional Cooperation (SAARC) region. The documentaries were primarily categorised by using three frameworks based on six modes, six subgenres, and four basic approaches of documentary. Subsequently, the findings were critiqued from CDA perspective. The outcome suggests that there a two schools of thoughts regarding documentaries. According to journalistic ethics, news and/or documentaries should be objective in orientation and focus on informing the audience and/common people. The empirical findings tend to challenge ethical parameters of objectivity. At times, it seems that journalistic discourse is discursively (re)constructed to give an augmented simulation of objectivity. Based on the findings it may be recommended that if documentaries steer away from empirical facts and indulge in poetic naivety, their credibility could be questioned. A research of this nature is significant as it raises questions with regard to ethical and moral conscience of documentary filmmakers. Furthermore, it looks at whether they uphold journalistic integrity or succumb to their bias, and thereby depict subjective views, which could be tainted with political and/or propagandist ulterior motifs.

Keywords: discursive (re/de)construction, documentaries, journalistic integrity, rape/flesh trade

Procedia PDF Downloads 130
24595 Cryopreservation of Ring-Necked Pheasant (Phasianus colchicus) Semen for Establishing Cryobank

Authors: Rida Pervaiz, Bushra Allah Rakha, Muhammad Sajjad Ansari, Shamim Akhter, Kainat Waseem, Sumiyyah Zuha, Tooba Javed

Abstract:

Ring-necked pheasant (Phasianus colchicus) belongs to order Galliformes and family Phasianidae. It has been recognized as the most hunted bird due to its attractive colorful appearance and meat. Loss of habitat and hunting pressure has caused population fluctuations in the native range. Under these circumstances, this species can be conserved by employing ex-situ in vitro conservation techniques. Captive breeding, in combination with semen cryobanking is the most appropriate option to conserve/propagate this species without deteriorating the genetic diversity. Cryopreservation protocols of adequate efficiency are necessary to establish semen cryobanking for a species. Therefore, present study was designed to devise an efficient extender for cryopreservation of ring-necked pheasant semen. For this purpose, a range of extenders (Beltsville Poultry, red fowl, Lake, EK, Tselutin Poultry and Chicken semen extenders) were evaluated for cryopreservation of ring-necked pheasant semen. Semen collected from 10 cocks, diluted in the Beltsville Poultry (BPSE), Red Fowl (RFE), Lake (LE), EK (EKE), Tselutin Poultry (TPE) and Chicken Semen (CSE) extenders and cryopreserved. Glycerol (10%) was added to semen at 4°C, equilibrated for 10 min, filled in 0.5 mL French straws, kept over liquid nitrogen vapors for 10 min, cryopreserved in LN2 and stored. Sperm motility (%), viability (%), live/dead ratio (%), plasma membrane (%) and DNA Integrity (%) were evaluated at post-dilution, post-cooling, post-equilibration and post-thawing stage of cryopreservation. Sperm motility (83.8 ± 3.1; 81.3 ± 3.8; 73.8 ± 2.4; 62.5 ± 1.4), viability (79.0 ± 1.7; 75.5 ± 1.6; 69.5 ± 2.3; 65.5 ± 2.4), live/dead ratio (80.5 ± 5.7; 77.3 ± 4.9; 76.0 ± 2.7; 68.3 ± 2.3), plasma membrane (74.5 ± 2.9; 73.8 ± 3.4; 71.3 ± 2.3; 75.0 ± 3.4) and DNA integrity (78.3 ± 1.7; 73.0 ± 1.2; 68.0 ± 2.0; 63.0 ± 2.5) at all four stages of cryopreservation were recorded higher (P < 0.05) in red fowl extender compared to all experimental extenders. It is concluded that red fowl extender is the best extender for cryopreservation of ring-necked pheasant semen and can be used in establishing cryobank for ex situ conservation.

Keywords: ring-necked pheasant; extenders; cryopreservation; semen quality; DNA integrity

Procedia PDF Downloads 115
24594 Modeling Of The Random Impingement Erosion Due To The Impact Of The Solid Particles

Authors: Siamack A. Shirazi, Farzin Darihaki

Abstract:

Solid particles could be found in many multiphase flows, including transport pipelines and pipe fittings. Such particles interact with the pipe material and cause erosion which threats the integrity of the system. Therefore, predicting the erosion rate is an important factor in the design and the monitor of such systems. Mechanistic models can provide reliable predictions for many conditions while demanding only relatively low computational cost. Mechanistic models utilize a representative particle trajectory to predict the impact characteristics of the majority of the particle impacts that cause maximum erosion rate in the domain. The erosion caused by particle impacts is not only due to the direct impacts but also random impingements. In the present study, an alternative model has been introduced to describe the erosion due to random impingement of particles. The present model provides a realistic trend for erosion with changes in the particle size and particle Stokes number. The present model is examined against the experimental data and CFD simulation results and indicates better agreement with the data incomparison to the available models in the literature.

Keywords: erosion, mechanistic modeling, particles, multiphase flow, gas-liquid-solid

Procedia PDF Downloads 148
24593 Groundwater Monitoring Using a Community: Science Approach

Authors: Shobha Kumari Yadav, Yubaraj Satyal, Ajaya Dixit

Abstract:

In addressing groundwater depletion, it is important to develop evidence base so to be used in assessing the state of its degradation. Groundwater data is limited compared to meteorological data, which impedes the groundwater use and management plan. Monitoring of groundwater levels provides information base to assess the condition of aquifers, their responses to water extraction, land-use change, and climatic variability. It is important to maintain a network of spatially distributed, long-term monitoring wells to support groundwater management plan. Monitoring involving local community is a cost effective approach that generates real time data to effectively manage groundwater use. This paper presents the relationship between rainfall and spring flow, which are the main source of freshwater for drinking, household consumptions and agriculture in hills of Nepal. The supply and withdrawal of water from springs depends upon local hydrology and the meteorological characteristics- such as rainfall, evapotranspiration and interflow. The study offers evidence of the use of scientific method and community based initiative for managing groundwater and springshed. The approach presents a method to replicate similar initiative in other parts of the country for maintaining integrity of springs.

Keywords: citizen science, groundwater, water resource management, Nepal

Procedia PDF Downloads 178
24592 Functional Instruction Set Simulator of a Neural Network IP with Native Brain Float-16 Generator

Authors: Debajyoti Mukherjee, Arathy B. S., Arpita Sahu, Saranga P. Pogula

Abstract:

A functional model to mimic the functional correctness of a neural network compute accelerator IP is very crucial for design validation. Neural network workloads are based on a Brain Floating Point (BF-16) data type. The major challenge we were facing was the incompatibility of GCC compilers to the BF-16 datatype, which we addressed with a native BF-16 generator integrated into our functional model. Moreover, working with big GEMM (General Matrix Multiplication) or SpMM (Sparse Matrix Multiplication) Work Loads (Dense or Sparse) and debugging the failures related to data integrity is highly painstaking. In this paper, we are addressing the quality challenge of such a complex neural network accelerator design by proposing a functional model-based scoreboard or software model using SystemC. The proposed functional model executes the assembly code based on the ISA of the processor IP, decodes all instructions, and executes as expected to be done by the DUT. The said model would give a lot of visibility and debug capability in the DUT, bringing up micro-steps of execution.

Keywords: ISA, neural network, Brain Float-16, DUT

Procedia PDF Downloads 66
24591 Stress Analysis of a Pressurizer in a Pressurized Water Reactor Using Finite Element Method

Authors: Tanvir Hasan, Minhaz Uddin, Anwar Sadat Anik

Abstract:

A pressurizer is a safety-related reactor component that maintains the reactor operating pressure to guarantee safety. Its structure is usually made of high thermal and pressure resistive material. The mechanical structure of these components should be maintained in all working settings, including transient to severe accidents conditions. The goal of this study is to examine the structural integrity and stress of the pressurizer in order to ensure its design integrity towards transient situations. For this, the finite element method (FEM) was used to analyze the mechanical stress on pressurizer components in this research. ANSYS MECHANICAL tool was used to analyze a 3D model of the pressurizer. The material for the body and safety relief nozzle is selected as low alloy steel i.e., SA-508 Gr.3 Cl.2. The model was put into ANSYS WORKBENCH and run under the boundary conditions of (internal Pressure, -17.2 MPa, inside radius, -1348mm, the thickness of the shell, -127mm, and the ratio of the outside radius to an inside radius, - 1.059). The theoretical calculation was done using the formulas and then the results were compared with the simulated results. When stimulated at design conditions, the findings revealed that the pressurizer stress analysis completely fulfilled the ASME standards.

Keywords: pressurizer, stress analysis, finite element method, nuclear reactor

Procedia PDF Downloads 130
24590 Semen Characteristics, Haematological and Serum- Biochemical Indices of Cocks Drenched Varying Levels of Turmeric Powder as Supplement

Authors: E. A. Amao, O. D. Amao, Z. O. Buzari, T. M. Adelegan, W. A. Tiamiyu, M. O. Yunus

Abstract:

Signals from in vivo as well as in vitro studies shows that botanicals play notable roles in the treatment, prevention and management of diseases. Use of natural compounds in botanicals has been suggested as potential alternative to conventional therapeutic options. Therefore this study aimed to evaluate the effect of varying levels of turmeric powder (Curcuma longa) on semen characteristics and haematological indices of cocks. Turmeric (C. longa) was obtained from a local market in Saki in Oyo State, Nigeria, in March 2023. The rhizomes were washed, its skin scraped and air-dried for about 10 h, and further oven-dried at 40◦C for 12 h. afterwards, the dried turmeric was ground into powder using a blender. The product was kept in an air-tight container until the period of usage. The experimental material was drenched in cocks (60 cocks assigned into four treatments with three replicates) at 0.0g (T1), 0.05g (T2), 1.00g (T3) and 1.5g (T4) after 2 weeks of acclimatization. Semen volume, sperm cell progressive motility, sperm cell liveability, acrosome integrity, sperm cell concentration and normal sperm cell were evaluated for semen characteristics. Haematological parameters measured were: PCV, RBC, WBC Hb, MCV, MCH and MCHC. Data obtained were subjected to one-way analysis of variance. Semen volume (0.34 – 0.37ml), sperm cell progressive motility (68.33 – 80%), sperm cell liveability (46.66 – 85.00%), acrosome integrity (50.00 – 85%) and normal sperm cell (66.66 – 90%) shows significant difference (p<0.05) in favour cocks on higher level of turmeric powder. While sperm cell concentration (28.33 -40.00 X109/ml) shows no significant difference (p>0.05). PCV (36.00 – 40.33%), RBC (3.55 – 3.74 X106/ml), WBC (19.01 – 19.71 X109/ml), Hb (11.66 – 13.00 dl), MCV (100.53 – 109.53 ⴄ), MCH (32.57 – 35.31pg) and MCHC (32.00 – 32.37%) shows no significant difference (p>0.05). all serum biochemical indices showed significant difference (p<0.05) with animals on the test ingredient showed higher values in respect of the increase in turmeric powder.

Keywords: semen volume, total protein, packed cell volume, turmeric powder, albumin

Procedia PDF Downloads 27
24589 An Integrated Approach to Handle Sour Gas Transportation Problems and Pipeline Failures

Authors: Venkata Madhusudana Rao Kapavarapu

Abstract:

The Intermediate Slug Catcher (ISC) facility was built to process nominally 234 MSCFD of export gas from the booster station on a day-to-day basis and to receive liquid slugs up to 1600 m³ (10,000 BBLS) in volume when the incoming 24” gas pipelines are pigged following upsets or production of non-dew-pointed gas from gathering centers. The maximum slug sizes expected are 812 m³ (5100 BBLS) in winter and 542 m³ (3400 BBLS) in summer after operating for a month or more at 100 MMSCFD of wet gas, being 60 MMSCFD of treated gas from the booster station, combined with 40 MMSCFD of untreated gas from gathering center. The water content is approximately 60% but may be higher if the line is not pigged for an extended period, owing to the relative volatility of the condensate compared to water. In addition to its primary function as a slug catcher, the ISC facility will receive pigged liquids from the upstream and downstream segments of the 14” condensate pipeline, returned liquids from the AGRP, pigged through the 8” pipeline, and blown-down fluids from the 14” condensate pipeline prior to maintenance. These fluids will be received in the condensate flash vessel or the condensate separator, depending on the specific operation, for the separation of water and condensate and settlement of solids scraped from the pipelines. Condensate meeting the colour and 200 ppm water specifications will be dispatched to the AGRP through the 14” pipeline, while off-spec material will be returned to BS-171 via the existing 10” condensate pipeline. When they are not in operation, the existing 24” export gas pipeline and the 10” condensate pipeline will be maintained under export gas pressure, ready for operation. The gas manifold area contains the interconnecting piping and valves needed to align the slug catcher with either of the 24” export gas pipelines from the booster station and to direct the gas to the downstream segment of either of these pipelines. The manifold enables the slug catcher to be bypassed if it needs to be maintained or if through-pigging of the gas pipelines is to be performed. All gas, whether bypassing the slug catcher or returning to the gas pipelines from it, passes through black powder filters to reduce the level of particulates in the stream. These items are connected to the closed drain vessel to drain the liquid collected. Condensate from the booster station is transported to AGRP through 14” condensate pipeline. The existing 10” condensate pipeline will be used as a standby and for utility functions such as returning condensate from AGRP to the ISC or booster station or for transporting off-spec fluids from the ISC back to booster station. The manifold contains block valves that allow the two condensate export lines to be segmented at the ISC, thus facilitating bi-directional flow independently in the upstream and downstream segments, which ensures complete pipeline integrity and facility integrity. Pipeline failures will be attended to with the latest technologies by remote techno plug techniques, and repair activities will be carried out as needed. Pipeline integrity will be evaluated with ili pigging to estimate the pipeline conditions.

Keywords: integrity, oil & gas, innovation, new technology

Procedia PDF Downloads 52
24588 Study on the Pavement Structural Performance of Highways in the North China Region Based on Pavement Distress and Ground Penetrating Radar

Authors: Mingwei Yi, Liujie Guo, Zongjun Pan, Xiang Lin, Xiaoming Yi

Abstract:

With the rapid expansion of road construction mileage in China, the scale of road maintenance needs has concurrently escalated. As the service life of roads extends, the design of pavement repair and maintenance emerges as a crucial component in preserving the excellent performance of the pavement. The remaining service life of asphalt pavement structure is a vital parameter in the lifecycle maintenance design of asphalt pavements. Based on an analysis of pavement structural integrity, this study introduces a characterization and assessment of the remaining life of existing asphalt pavement structures. It proposes indicators such as the transverse crack spacing and the length of longitudinal cracks. The transverse crack spacing decreases with an increase in maintenance intervals and with the extended use of semi-rigid base layer structures, although this trend becomes less pronounced after maintenance intervals exceed 4 years. The length of longitudinal cracks increases with longer maintenance intervals, but this trend weakens after five years. This system can support the enhancement of standardization and scientific design in highway maintenance decision-making processes.

Keywords: structural integrity, highways, pavement evaluation, asphalt concrete pavement

Procedia PDF Downloads 35
24587 Study on Effect of Reverse Cyclic Loading on Fracture Resistance Curve of Equivalent Stress Gradient (ESG) Specimen

Authors: Jaegu Choi, Jae-Mean Koo, Chang-Sung Seok, Byungwoo Moon

Abstract:

Since massive earthquakes in the world have been reported recently, the safety of nuclear power plants for seismic loading has become a significant issue. Seismic loading is the reverse cyclic loading, consisting of repeated tensile and compression by longitudinal and transverse wave. Up to this time, the study on characteristics of fracture toughness under reverse cyclic loading has been unsatisfactory. Therefore, it is necessary to obtain the fracture toughness under reverse cyclic load for the integrity estimation of nuclear power plants under seismic load. Fracture resistance (J-R) curves, which are used for determination of fracture toughness or integrity estimation in terms of elastic-plastic fracture mechanics, can be derived by the fracture resistance test using single specimen technique. The objective of this paper is to study the effects of reverse cyclic loading on a fracture resistance curve of ESG specimen, having a similar stress gradient compared to the crack surface of the real pipe. For this, we carried out the fracture toughness test under the reverse cyclic loading, while changing incremental plastic displacement. Test results showed that the J-R curves were decreased with a decrease of the incremental plastic displacement.

Keywords: reverse cyclic loading, j-r curve, ESG specimen, incremental plastic displacement

Procedia PDF Downloads 363
24586 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 352
24585 An Investigation on Orthopedic Rehabilitation by Avoiding Thermal Necrosis

Authors: R. V. Dahibhate, A. B. Deoghare, P. M. Padole

Abstract:

Maintaining natural integrity of biosystem is paramount significant for orthopedic surgeon while performing surgery. Restoration is challenging task to rehabilitate trauma patient. Drilling is an inevitable procedure to fix implants. The task leads to rise in temperature at the contact site which intends to thermal necrosis. A precise monitoring can avoid thermal necrosis. To accomplish it, data acquiring instrument is integrated with the drill bit. To contemplate it, electronic feedback system is developed. It not only measures temperature without any physical contact in between measuring device and target but also visualizes the site and monitors correct movement of tool path. In the current research work an infrared thermometer data acquisition system is used which monitors variation in temperature at the drilling site and a camera captured movement of drill bit advancement. The result is presented in graphical form which represents variations in temperature, drill rotation and time. A feedback system helps in keeping drill speed in threshold limit.

Keywords: thermal necrosis, infrared thermometer, drilling tool, feedback system

Procedia PDF Downloads 210
24584 Signal Processing of Barkhausen Noise Signal for Assessment of Increasing Down Feed in Surface Ground Components with Poor Micro-Magnetic Response

Authors: Tanmaya Kumar Dash, Tarun Karamshetty, Soumitra Paul

Abstract:

The Barkhausen Noise Analysis (BNA) technique has been utilized to assess surface integrity of steels. But the BNA technique is not very successful in evaluating surface integrity of ground steels that exhibit poor micro-magnetic response. A new approach has been proposed for the processing of BN signal with Fast Fourier transforms while Wavelet transforms has been used to remove noise from the BN signal, with judicious choice of the ‘threshold’ value, when the micro-magnetic response of the work material is poor. In the present study, the effect of down feed induced upon conventional plunge surface grinding of hardened bearing steel has been investigated along with an ultrasonically cleaned, wet polished and a sample ground with spark out technique for benchmarking. Moreover, the FFT analysis has been established, at different sets of applied voltages and applied frequency and the pattern of the BN signal in the frequency domain is analyzed. The study also depicts the wavelet transforms technique with different levels of decomposition and different mother wavelets, which has been used to reduce the noise value in BN signal of materials with poor micro-magnetic response, in order to standardize the procedure for all BN signals depending on the frequency of the applied voltage.

Keywords: barkhausen noise analysis, grinding, magnetic properties, signal processing, micro-magnetic response

Procedia PDF Downloads 648
24583 The Effects of Gas Metal Arc Welding Parameters on the Corrosion Behaviour of Austenitic Stainless Steel Immersed in Aqueous Sodium Hydroxide

Authors: I. M. B. Omiogbemi, D. S. Yawas, I. M. Dagwa, F. G. Okibe

Abstract:

This work present the effects of some gas metal arc welding parameters on the corrosion behavior of austenitic stainless steel, exposed to 0.5M sodium hydroxide at ambient temperatures (298K) using conventional weight loss determination, together with surface morphology evaluation by scanning electron microscopy and the application of factorial design of experiment to determine welding conditions which enhance the integrity of the welded stainless steel. The welding variables evaluated include speed, voltage and current. Different samples of the welded stainless steels were immersed in the corrosion environment for 8, 16, 24, 32 and 40 days and weight loss determined. From the results, it was found that increase in welding current and speed at constant voltage gave the optimum performance of the austenitic stainless steel in the environment. At a of speed 40cm/min, 110Amp current and voltage of 230 volt the welded stainless steel showed only a 0.0015mg loss in weight after 40 days. Pit-like openings were observed on the surface of the metals indicating corrosion but were minimal at the optimum conditions. It was concluded from the research that relatively high welding speed and current at a constant voltage gives a good welded austenitic stainless steel with better integrity.

Keywords: welding, current, speed, austenitic stainless steel, sodium hydroxide

Procedia PDF Downloads 291
24582 Comparing Different Frequency Ground Penetrating Radar Antennas for Tunnel Health Assessment

Authors: Can Mungan, Gokhan Kilic

Abstract:

Structural engineers and tunnel owners have good reason to attach importance to the assessment and inspection of tunnels. Regular inspection is necessary to maintain and monitor the health of the structure not only at the present time but throughout its life cycle. Detection of flaws within the structure, such as corrosion and the formation of cracks within the internal elements of the structure, can go a long way to ensuring that the structure maintains its integrity over the course of its life. Other issues that may be detected earlier through regular assessment include tunnel surface delamination and the corrosion of the rebar. One advantage of new technology such as the ground penetrating radar (GPR) is the early detection of imperfections. This study will aim to discuss and present the effectiveness of GPR as a tool for assessing the structural integrity of the heavily used tunnel. GPR is used with various antennae in frequency and application method (2 GHz and 500 MHz GPR antennae). The paper will attempt to produce a greater understanding of structural defects and identify the correct tool for such purposes. Conquest View with 3D scanning capabilities was involved throughout the analysis, reporting, and interpretation of the results. This study will illustrate GPR mapping and its effectiveness in providing information of value when it comes to rebar position (lower and upper reinforcement). It will also show how such techniques can detect structural features that would otherwise remain unseen, as well as moisture ingress.

Keywords: tunnel, GPR, health monitoring, moisture ingress, rebar position

Procedia PDF Downloads 100
24581 Functional Instruction Set Simulator (ISS) of a Neural Network (NN) IP with Native BF-16 Generator

Authors: Debajyoti Mukherjee, Arathy B. S., Arpita Sahu, Saranga P. Pogula

Abstract:

A Functional Model to mimic the functional correctness of a Neural Network Compute Accelerator IP is very crucial for design validation. Neural network workloads are based on a Brain Floating Point (BF-16) data type. The major challenge we were facing was the incompatibility of gcc compilers to BF-16 datatype, which we addressed with a native BF-16 generator integrated to our functional model. Moreover, working with big GEMM (General Matrix Multiplication) or SpMM (Sparse Matrix Multiplication) Work Loads (Dense or Sparse) and debugging the failures related to data integrity is highly painstaking. In this paper, we are addressing the quality challenge of such a complex Neural Network Accelerator design by proposing a Functional Model-based scoreboard or Software model using SystemC. The proposed Functional Model executes the assembly code based on the ISA of the processor IP, decodes all instructions, and executes as expected to be done by the DUT. The said model would give a lot of visibility and debug capability in the DUT bringing up micro-steps of execution.

Keywords: ISA (instruction set architecture), NN (neural network), TLM (transaction-level modeling), GEMM (general matrix multiplication)

Procedia PDF Downloads 53
24580 Applying Biculturalism in Studying Tourism Host Community Cultural Integrity and Individual Member Stress

Authors: Shawn P. Daly

Abstract:

Communities heavily engaged in the tourism industry discover their values intersect, meld, and conflict with those of visitors. Maintaining cultural integrity in the face of powerful external pressures causes stress among society members. This effect represents a less studied aspect of sustainable tourism. The present paper brings a perspective unique to the tourism literature: biculturalism. The grounded theories, coherent hypotheses, and validated constructs and indicators of biculturalism represent a sound base from which to consider sociocultural issues in sustainable tourism. Five models describe the psychological state of individuals operating at cultural crossroads: assimilation (joining the new culture), acculturation (grasping the new culture but remaining of the original culture), alternation (varying behavior to cultural context), multicultural (maintaining distinct cultures), and fusion (blending cultures). These five processes divide into two units of analysis (individual and society), permitting research questions at levels important for considering sociocultural sustainability. Acculturation modelling has morphed into dual processes of acculturation (new culture adaptation) and enculturation (original culture adaptation). This dichotomy divides sustainability research questions into human impacts from assimilation (acquiring new culture, throwing away original), separation (rejecting new culture, keeping original), integration (acquiring new culture, keeping original), and marginalization (rejecting new culture, throwing away original). Biculturalism is often cast in terms of its emotional, behavioral, and cognitive dimensions. Required cultural adjustments and varying levels of cultural competence lead to physical, psychological, and emotional outcomes, including depression, lowered life satisfaction and self-esteem, headaches, and back pain—or enhanced career success, social skills, and life styles. Numerous studies provide empirical scales and research hypotheses for sustainability research into tourism’s causality and effect on local well-being. One key issue in applying biculturalism to sustainability scholarship concerns identification and specification of the alternative new culture contacting local culture. Evidence exists for tourism industry, universal tourist, and location/event-specific tourist culture. The biculturalism paradigm holds promise for researchers examining evolving cultural identity and integrity in response to mass tourism. In particular, confirmed constructs and scales simplify operationalization of tourism sustainability studies in terms of human impact and adjustment.

Keywords: biculturalism, cultural integrity, psychological and sociocultural adjustment, tourist culture

Procedia PDF Downloads 382
24579 Reducing the Computational Cost of a Two-way Coupling CFD-FEA Model via a Multi-scale Approach for Fire Determination

Authors: Daniel Martin Fellows, Sean P. Walton, Jennifer Thompson, Oubay Hassan, Kevin Tinkham, Ella Quigley

Abstract:

Structural integrity for cladding products is a key performance parameter, especially concerning fire performance. Cladding products such as PIR-based sandwich panels are tested rigorously, in line with industrial standards. Physical fire tests are necessary to ensure the customer's safety but can give little information about critical behaviours that can help develop new materials. Numerical modelling is a tool that can help investigate a fire's behaviour further by replicating the fire test. However, fire is an interdisciplinary problem as it is a chemical reaction that behaves fluidly and impacts structural integrity. An analysis using Computational Fluid Dynamics (CFD) and Finite Element Analysis (FEA) is needed to capture all aspects of a fire performance test. One method is a two-way coupling analysis that imports the updated changes in thermal data, due to the fire's behaviour, to the FEA solver in a series of iterations. In light of our recent work with Tata Steel U.K using a two-way coupling methodology to determine the fire performance, it has been shown that a program called FDS-2-Abaqus can make predictions of a BS 476 -22 furnace test with a degree of accuracy. The test demonstrated the fire performance of Tata Steel U.K Trisomet product, a Polyisocyanurate (PIR) based sandwich panel used for cladding. Previous works demonstrated the limitations of the current version of the program, the main limitation being the computational cost of modelling three Trisomet panels, totalling an area of 9 . The computational cost increases substantially, with the intention to scale up to an LPS 1181-1 test, which includes a total panel surface area of 200 .The FDS-2-Abaqus program is developed further within this paper to overcome this obstacle and better accommodate Tata Steel U.K PIR sandwich panels. The new developments aim to reduce the computational cost and error margin compared to experimental data. One avenue explored is a multi-scale approach in the form of Reduced Order Modeling (ROM). The approach allows the user to include refined details of the sandwich panels, such as the overlapping joints, without a computationally costly mesh size.Comparative studies will be made between the new implementations and the previous study completed using the original FDS-2-ABAQUS program. Validation of the study will come from physical experiments in line with governing body standards such as BS 476 -22 and LPS 1181-1. The physical experimental data includes the panels' gas and surface temperatures and mechanical deformation. Conclusions are drawn, noting the new implementations' impact factors and discussing the reasonability for scaling up further to a whole warehouse.

Keywords: fire testing, numerical coupling, sandwich panels, thermo fluids

Procedia PDF Downloads 47
24578 Processing Big Data: An Approach Using Feature Selection

Authors: Nikat Parveen, M. Ananthi

Abstract:

Big data is one of the emerging technology, which collects the data from various sensors and those data will be used in many fields. Data retrieval is one of the major issue where there is a need to extract the exact data as per the need. In this paper, large amount of data set is processed by using the feature selection. Feature selection helps to choose the data which are actually needed to process and execute the task. The key value is the one which helps to point out exact data available in the storage space. Here the available data is streamed and R-Center is proposed to achieve this task.

Keywords: big data, key value, feature selection, retrieval, performance

Procedia PDF Downloads 313
24577 Study on High Performance Fiber Reinforced Concrete (HPFRC) Beams on Subjected to Cyclic Loading

Authors: A. Siva, K. Bala Subramanian, Kinson Prabu

Abstract:

Concrete is widely used construction materials all over the world. Now a day’s fibers are used in this construction due to its advantages like increase in stiffness, energy absorption, ductility and load carrying capacity. The fiber used in the concrete to increases the structural integrity of the member. It is one of the emerging techniques used in the construction industry. In this paper, the effective utilization of high-performance fiber reinforced concrete (HPFRC) beams has been experimental investigated. The experimental investigation has been conducted on different steel fibers (Hooked, Crimpled, and Hybrid) under cyclic loading. The behaviour of HPFRC beams is compared with the conventional beams. Totally four numbers of specimens were cast with different content of fiber concrete and compared conventional concrete. The fibers are added to the concrete by base volume replacement of concrete. The silica fume and superplasticizers were used to modify the properties of concrete. Single point loading was carried out for all the specimens, and the beam specimens were subjected to cyclic loading. The load-deflection behaviour of fibers is compared with the conventional concrete. The ultimate load carrying capacity, energy absorption and ductility of hybrid fiber reinforced concrete is higher than the conventional concrete by 5% to 10%.

Keywords: cyclic loading, ductility, high performance fiber reinforced concrete, structural integrity

Procedia PDF Downloads 246
24576 AI-Enabled Smart Contracts for Reliable Traceability in the Industry 4.0

Authors: Harris Niavis, Dimitra Politaki

Abstract:

The manufacturing industry was collecting vast amounts of data for monitoring product quality thanks to the advances in the ICT sector and dedicated IoT infrastructure is deployed to track and trace the production line. However, industries have not yet managed to unleash the full potential of these data due to defective data collection methods and untrusted data storage and sharing. Blockchain is gaining increasing ground as a key technology enabler for Industry 4.0 and the smart manufacturing domain, as it enables the secure storage and exchange of data between stakeholders. On the other hand, AI techniques are more and more used to detect anomalies in batch and time-series data that enable the identification of unusual behaviors. The proposed scheme is based on smart contracts to enable automation and transparency in the data exchange, coupled with anomaly detection algorithms to enable reliable data ingestion in the system. Before sensor measurements are fed to the blockchain component and the smart contracts, the anomaly detection mechanism uniquely combines artificial intelligence models to effectively detect unusual values such as outliers and extreme deviations in data coming from them. Specifically, Autoregressive integrated moving average, Long short-term memory (LSTM) and Dense-based autoencoders, as well as Generative adversarial networks (GAN) models, are used to detect both point and collective anomalies. Towards the goal of preserving the privacy of industries' information, the smart contracts employ techniques to ensure that only anonymized pointers to the actual data are stored on the ledger while sensitive information remains off-chain. In the same spirit, blockchain technology guarantees the security of the data storage through strong cryptography as well as the integrity of the data through the decentralization of the network and the execution of the smart contracts by the majority of the blockchain network actors. The blockchain component of the Data Traceability Software is based on the Hyperledger Fabric framework, which lays the ground for the deployment of smart contracts and APIs to expose the functionality to the end-users. The results of this work demonstrate that such a system can increase the quality of the end-products and the trustworthiness of the monitoring process in the smart manufacturing domain. The proposed AI-enabled data traceability software can be employed by industries to accurately trace and verify records about quality through the entire production chain and take advantage of the multitude of monitoring records in their databases.

Keywords: blockchain, data quality, industry4.0, product quality

Procedia PDF Downloads 155
24575 Predicting Daily Patient Hospital Visits Using Machine Learning

Authors: Shreya Goyal

Abstract:

The study aims to build user-friendly software to understand patient arrival patterns and compute the number of potential patients who will visit a particular health facility for a given period by using a machine learning algorithm. The underlying machine learning algorithm used in this study is the Support Vector Machine (SVM). Accurate prediction of patient arrival allows hospitals to operate more effectively, providing timely and efficient care while optimizing resources and improving patient experience. It allows for better allocation of staff, equipment, and other resources. If there's a projected surge in patients, additional staff or resources can be allocated to handle the influx, preventing bottlenecks or delays in care. Understanding patient arrival patterns can also help streamline processes to minimize waiting times for patients and ensure timely access to care for patients in need. Another big advantage of using this software is adhering to strict data protection regulations such as the Health Insurance Portability and Accountability Act (HIPAA) in the United States as the hospital will not have to share the data with any third party or upload it to the cloud because the software can read data locally from the machine. The data needs to be arranged in. a particular format and the software will be able to read the data and provide meaningful output. Using software that operates locally can facilitate compliance with these regulations by minimizing data exposure. Keeping patient data within the hospital's local systems reduces the risk of unauthorized access or breaches associated with transmitting data over networks or storing it in external servers. This can help maintain the confidentiality and integrity of sensitive patient information. Historical patient data is used in this study. The input variables used to train the model include patient age, time of day, day of the week, seasonal variations, and local events. The algorithm uses a Supervised learning method to optimize the objective function and find the global minima. The algorithm stores the values of the local minima after each iteration and at the end compares all the local minima to find the global minima. The strength of this study is the transfer function used to calculate the number of patients. The model has an output accuracy of >95%. The method proposed in this study could be used for better management planning of personnel and medical resources.

Keywords: machine learning, SVM, HIPAA, data

Procedia PDF Downloads 47
24574 Multi-Level Security Measures in Cloud Computing

Authors: Shobha G. Ranjan

Abstract:

Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.

Keywords: cloud computing, cloud security, integrity, multi-tenancy, security

Procedia PDF Downloads 478
24573 Improving the Patient Guidance Satisfaction and Integrity of Patients Hospitalized in Iodine-131 Isolation Rooms

Authors: Yu Sin Syu

Abstract:

Objective: The study aimed to improve the patient guidance satisfaction of patients hospitalized in iodine-131 isolation rooms, as well as the patient guidance completion rate for such patients. Method: A patient care guidance checklist and patient care guidance satisfaction questionnaire were administered to 29 patients who had previously been hospitalized in iodine-131 isolation rooms. The evaluation was conducted on a one-on-one basis, and its results showed that the patients’ satisfaction with patient guidance was only 3.7 points and that the completion rate for the patient guidance performed by nurses was only 67%. Therefore, various solutions were implemented to create a more complete patient guidance framework for nurses, including the incorporation of regular care-related training in in-service education courses; the establishment of patient care guidance standards for patients in iodine-131 isolation rooms; the establishment of inpatient care standards and auditing processes for iodine-131 isolation rooms; the creation of an introductory handbook on ward environment; Invite other the care team the revision of iodine-131 health education brochures; the creation of visual cards and videos covering equipment operation procedures; and introduction of QR codes. Results: Following the implementation of the above measures, the overall satisfaction of patients hospitalized in iodine-131 isolation rooms increased from 3.7 points to 4.6 points, and the completion rate for patient guidance rose from 67% to 100%. Conclusion: Given the excellent results achieved in this study, it is hoped that this nursing project can serve as a benchmark for other relevant departments.

Keywords: admission care guidance, guidance satisfaction, integrity, Iodine131 isolation

Procedia PDF Downloads 97
24572 Efficient Reuse of Exome Sequencing Data for Copy Number Variation Callings

Authors: Chen Wang, Jared Evans, Yan Asmann

Abstract:

With the quick evolvement of next-generation sequencing techniques, whole-exome or exome-panel data have become a cost-effective way for detection of small exonic mutations, but there has been a growing desire to accurately detect copy number variations (CNVs) as well. In order to address this research and clinical needs, we developed a sequencing coverage pattern-based method not only for copy number detections, data integrity checks, CNV calling, and visualization reports. The developed methodologies include complete automation to increase usability, genome content-coverage bias correction, CNV segmentation, data quality reports, and publication quality images. Automatic identification and removal of poor quality outlier samples were made automatically. Multiple experimental batches were routinely detected and further reduced for a clean subset of samples before analysis. Algorithm improvements were also made to improve somatic CNV detection as well as germline CNV detection in trio family. Additionally, a set of utilities was included to facilitate users for producing CNV plots in focused genes of interest. We demonstrate the somatic CNV enhancements by accurately detecting CNVs in whole exome-wide data from the cancer genome atlas cancer samples and a lymphoma case study with paired tumor and normal samples. We also showed our efficient reuses of existing exome sequencing data, for improved germline CNV calling in a family of the trio from the phase-III study of 1000 Genome to detect CNVs with various modes of inheritance. The performance of the developed method is evaluated by comparing CNV calling results with results from other orthogonal copy number platforms. Through our case studies, reuses of exome sequencing data for calling CNVs have several noticeable functionalities, including a better quality control for exome sequencing data, improved joint analysis with single nucleotide variant calls, and novel genomic discovery of under-utilized existing whole exome and custom exome panel data.

Keywords: bioinformatics, computational genetics, copy number variations, data reuse, exome sequencing, next generation sequencing

Procedia PDF Downloads 236
24571 Defect Classification of Hydrogen Fuel Pressure Vessels using Deep Learning

Authors: Dongju Kim, Youngjoo Suh, Hyojin Kim, Gyeongyeong Kim

Abstract:

Acoustic Emission Testing (AET) is widely used to test the structural integrity of an operational hydrogen storage container, and clustering algorithms are frequently used in pattern recognition methods to interpret AET results. However, the interpretation of AET results can vary from user to user as the tuning of the relevant parameters relies on the user's experience and knowledge of AET. Therefore, it is necessary to use a deep learning model to identify patterns in acoustic emission (AE) signal data that can be used to classify defects instead. In this paper, a deep learning-based model for classifying the types of defects in hydrogen storage tanks, using AE sensor waveforms, is proposed. As hydrogen storage tanks are commonly constructed using carbon fiber reinforced polymer composite (CFRP), a defect classification dataset is collected through a tensile test on a specimen of CFRP with an AE sensor attached. The performance of the classification model, using one-dimensional convolutional neural network (1-D CNN) and synthetic minority oversampling technique (SMOTE) data augmentation, achieved 91.09% accuracy for each defect. It is expected that the deep learning classification model in this paper, used with AET, will help in evaluating the operational safety of hydrogen storage containers.

Keywords: acoustic emission testing, carbon fiber reinforced polymer composite, one-dimensional convolutional neural network, smote data augmentation

Procedia PDF Downloads 68
24570 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 108
24569 A Review: Artificial Intelligence (AI) Driven User Access Management and Identity Governance

Authors: Rupan Preet Kaur

Abstract:

This article reviewed the potential of artificial intelligence in the field of identity and access management (IAM) and identity governance and administration (IGA), the most critical pillars of any organization. The power of leveraging AI in the most complex and huge user base environment was outlined by simplifying and streamlining the user access approvals and re-certifications without any impact on the user productivity and at the same time strengthening the overall compliance of IAM landscape. Certain challenges encountered in the current state were detailed where majority of organizations are still lacking maturity in the data integrity aspect. Finally, this paper concluded that within the realm of possibility, users and application owners can reap the benefits of unified approach provided by AI to improve the user experience, improve overall efficiency, and strengthen the risk posture.

Keywords: artificial intelligence, machine learning, user access review, access approval

Procedia PDF Downloads 65
24568 Protective Role of CoQ10 or L-Carnitine on the Integrity of the Myocardium in Doxorubicin Induced Toxicity

Authors: Gehan A. Hegazy, Hesham N. Mustafa, Sally A. El Awdan, Marawan AbdelBaset

Abstract:

Doxorubicin (DOX) is a chemotherapeutic agent used for the treatment of different cancers and its clinical usage is hindered by the oxidative injury-related cardiotoxicity. This work aims to declare if the harmful effects of DOX on the heart can be alleviated with the use of Coenzyme Q10 (CoQ10) or L-carnitine. The study was performed on seventy-two female Wistar albino rats divided into six groups, 12 animals each: Control group; DOX group (10 mg/kg); CoQ10 group (200 mg/kg); L-carnitine group (100 mg/kg); DOX + CoQ10 group; DOX + L-carnitine group. CoQ10 and L-carnitine treatment orally started five days before a single dose of 10 mg/kg DOX that injected intraperitoneally (IP) then the treatment continued for ten days. At the end of the study, serum biochemical parameters of cardiac damage, oxidative stress indices, and histopathological changes were investigated. CoQ10 or L-carnitine showed noticeable effects in improving cardiac functions evidenced reducing serum enzymes as serum interleukin-1 beta (IL-1), tumor necrosis factor alpha (TNF-), leptin, lactate dehydrogenase (LDH), Cardiotrophin-1, Troponin-I and Troponin-T. Also, alleviate oxidative stress, decrease of cardiac Malondialdehyde (MDA), Nitric oxide (NO) and restoring cardiac reduced glutathione levels to normal levels. Both corrected the cardiac alterations histologically and ultrastructurally. With visible improvements in -SMA, vimentin and eNOS immunohistochemical markers. CoQ10 or L-carnitine supplementation improves the functional and structural integrity of the myocardium.

Keywords: CoQ10, doxorubicin, L-Carnitine, cardiotoxicity

Procedia PDF Downloads 144
24567 The Effect of Impact on the Knee Joint Due to the Shocks during Double Impact Phase of Gait Cycle

Authors: Jobin Varghese, V. M. Akhil, P. K. Rajendrakumar, K. S. Sivanandan

Abstract:

The major contributor to the human locomotion is the knee flexion and extension. During heel strike, a huge amount of energy is transmitted through the leg towards knee joint, which in fact is damped at heel and leg muscles. During high shocks, although it is damped to a certain extent, the balance force transmits towards knee joint which could damage the knee. Due to the vital function of the knee joint, it should be protected against damage due to additional load acting on it. This work concentrates on the development of spring mass damper system which exactly replicates the stiffness at the heel and muscles and the objective function is optimized to minimize the force acting at the knee joint. Further, the data collected using force plate are put into the model to verify its integrity and are found to be in good agreement.

Keywords: spring, mass, damper, knee joint

Procedia PDF Downloads 248